Preview

Research Methods

Good Essays
Open Document
Open Document
885 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Research Methods
Research Design and Methodology
Qualitative research methodology will be used for this research study, the primary rationale of this qualitative research is to analysis the risks associated with cloud security. Qualitative Research is used to gain an understanding of underlying reasons, opinions, and motivations. It provides insights into the problem or helps to develop ideas or hypotheses for potential quantitative research (Leedy, Ormrod, 2010). Since security concerns about cloud computing are heightened and fueled by misconceptions related to security and compliance risks. Unfortunately, these security concerns are seldom expressed quantifiably. The qualitative aspect of this research will be to bring clarity to cloud security, compliance, and business risks and creates a framework that can help align perceived risks of cloud computing with actual risks (Himmel 2012). Regardless of the field of study or preference for defining data (quantitative, qualitative) (Leedy, Ormrod, 2010), accurate data collection is essential to maintaining the integrity of research and accessibility of research data in a rapidly evolving digital age will take the collective efforts of universities and other research institutions (SecienceDaily, 2009). The justification for preserving data integrity is to support the detection of errors in the data collection process, For this research, data collection refers to the process of gathering and measuring information on variables of interest in an established systematic fashion that enables one to answer stated research questions, test hypotheses, and evaluate outcomes. Although, data collection methodologies vary by projects, the aim of successful data collection should always be to uphold the integrity of the project, the institution, and the researchers involved. Therefore, the collection of data for this study, will be pertaining to, but not limited to: cloud computing, cloud security, and security protocols from

You May Also Find These Documents Helpful

  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Sci/412 7980 Case Study 1

    • 622 Words
    • 3 Pages

    The following is a case study of the benefits of utilizing cloud computing in the public sector. "Cloud computing has the potential to greatly reduce waste, increase data center efficiency and utilization rates, and lower operating costs."(Kundra, 2010) Using the CIO Council 's 2010 document titled State of Public Sector Cloud Computing, this case study will match 10 of its case study examples with the nine benefits from the Federal Cloud Computing Strategy (Cloud First Policy). In further detail the case study of the Social Security Administration - Online Answers Knowledgebase and its benefits will be discussed.…

    • 622 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Trust is not easily defined, but most people agree that when it comes to cloud computing, transparency is essential to creating trust. Businesses must be able to see cloud service providers are complying with agreed data security standards and practices. These must include controls around who has access to data, staff security vetting practices, and the technologies and processes to segregate, backup and delete data. Suppliers of cloud technologies and services are quick to claim that cloud computing is well equipped to provide the necessary controls. Virtualization, they argue, underlies cloud computing, and therein lies the potential to achieve hitherto impossible levels of security. While virtualization is viewed with suspicion and fear by many IT directors, suppliers like RSA, IBM and other say that the technology enables organizations to build security into the infrastructure and automate security processes, to surpass traditional data protection…

    • 1351 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Cis 500- Cloud Computing

    • 1078 Words
    • 5 Pages

    Technology has taken great leaps of advancement. Some of the new technology that companies and consumers are taking advantage of to store and process data is cloud computing. Cloud computing was derived from virtualization. Virtualization allows companies to separate business applications from hardware. Doing this gives the company the capability of assigning applications as needed. The option to manage applications is a great benefit to companies. Resulting from the virtualization error, cloud computing has emerged to provide flexible IT infrastructures. This has not only enhanced the options companies now have, but it is also proven to be more cost efficient. This has increasingly become a preferred method of companies and consumers alike. (Turban, & Volonino, 2011, p.47)…

    • 1078 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The use of this tool will help provide an assessment for the stakeholders on the effectiveness of the internal security and controls related to the cloud computing environment. Deficiencies within the internal controls can be identified. An assessment can be prepared for the stakeholders that will help them determine if the quality and reliability of the service they are being provided is compliant with the results of the internals control audits.…

    • 1171 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    In this article, Patrick Thibodeau comments on Federal CIO Vivek Kundra’s claim that cloud computing concerns are exaggerated. Thibodeau explains clearly the claims made by Kundra about the overall security with cloud computing. Thibodeau blames the scare of cloud computing to IT developers belief of a status quo. Thibodeau concludes the article with a few success stories of basic cloud computing services working in the U.S. Government.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cloud Security Report

    • 9993 Words
    • 40 Pages

    Cloud Computing is the result of a rapid evolution of computing technologies and a response to the new world business requirements. The adoption of the technology is widely accepted and its future is promising. However the cloud computing phenomena does not come without a risk. There are many issues of concerns that might slow the adoption of the cloud computing; most notably are the security concerns which come as a result of the complexity of cloud technologies and the wide parties involved with them. Issues such as cloud computing compliance and governance, cloud computing deployment and architectural models, virtualization, cloud computing applications, cloud operations, standards, guidelines, frameworks and contracting for cloud service provisioning are all necessary for any business to understand before adopting the technology. This report will explain the top security risks of using cloud service providers for essential business applications and how they can be identified using the cloud risk assessment process. It will also explore various topics related to cloud computing, including concepts and terminologies of cloud security, risk assessment, frameworks and standards. It will conclude with a scenario of a case study to explain the process of analyzing a cloud service provider services security; and to show some of the most common cloud computing risks that exist in the world.…

    • 9993 Words
    • 40 Pages
    Powerful Essays
  • Powerful Essays

    Cloud computing is a new name for an old concept: the delivery of computing services from a remote location, analogous to the way electricity, water, and other utilities are provided to most customers. Cloud computing services are delivered through a network, usually the Internet. Some cloud services are adaptations of familiar applications, such as e-mail and word processing. Others are new applications that never existed as a local application, such as online maps and social networks. Since 2009, the federal government has been shifting its data storage needs to cloud-based services and away from agency-owned data centers. This shift is intended to reduce the total investment by the federal government in information technology (IT) (data centers), as well as realize other stated advantages of cloud adoption: efficiency, accessibility, collaboration, rapidity of innovation, reliability, and security. In December 2010, the U.S. Chief Information Officer (CIO) released “A 25-Point Implementation Plan to Reform Federal IT Management” as part of a comprehensive effort to increase the operational efficiency of federal technology assets. One element of the 25-Point Plan is for agencies to shift to a “Cloud First” policy, which is being implemented through the Federal Cloud Computing Strategy. The Cloud First policy means that federal agencies must (1) implement cloud-based solutions whenever a secure, reliable, and cost-effective cloud option…

    • 13907 Words
    • 56 Pages
    Powerful Essays
  • Powerful Essays

    Business Trend Memo

    • 1299 Words
    • 6 Pages

    Hayes, B. (2008, March), “Cloud computing”, Communications of the ACM, 51, 9-11. Retrieved from http://cacm.acm.org/magazines/2008/7/5368-cloud-computing/fulltext…

    • 1299 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The first article is “Cyber Security Considerations When Moving to Public Cloud Computing” by Muhammed A. Badamas, which mainly examines the potential and possibility of data security concerns to derail the future of public cloud computing. I am so interested in the Cloud computing since The reason why I chose this article is because that the author interviewed four real-life companies which represented different level of profitability and scale of operation.…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Research Method

    • 558 Words
    • 3 Pages

    4/Based on your answer to question 3, how would you state Bowden’s research question, if she was submitting this article to Dr. Kelly as her class project for Research Methods?…

    • 558 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Research methods

    • 782 Words
    • 3 Pages

    In 1939 Wendell Johnson set up ‘The Monster Study’, which involved placing 22 orphan children into two experimental groups, the ‘stutterers’ and the ‘non-stutterers’. Though it is important to note that only half of the children put into the ‘stuttering’ group actually had a stuttering problem. The non-stuttering group were given positive speech therapy, praising how well and fluent they spoke, while the other group received negative speech therapy, criticised for every single imperfection and told they were stutterers. By the end of the experiment the children who before had had no problems with their speech now did, and 3 of the 5 children who already had stutters were considerably worse.…

    • 782 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Security Principles

    • 682 Words
    • 3 Pages

    The management issue has concurred with technological innovations that enable information to be used and stored more effectively than previously. Management needs to understand the issues impacting information systems to be effective meet the company goals. A cloud is a powerful arrangement of cloud computing, networking, storage, management solutions, and business applications that facilitate a new generation of IT and consumer services. These services are available on demand and are delivered economically without compromising security or functionality. Solving today 's biggest business and technology challenges requires an approach that fully integrates the three pillars of cloud computing: applications and services, data centers, and networks (Cloud Computing, 2012). There is an issue that should be very important to all of us regarding the internet. Security problems happen on a consistent when we are using our computer to do business online. When we are doing our banking or setting up…

    • 682 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Undetstanding Organizations

    • 3286 Words
    • 14 Pages

    References: to the chosen organisation are clearly related to the issues under discussion and well chosen to support your analysis. Conclusion Succinctly draws together and summarises the main issues emerging from the case analysis. No new references included here. Presentation and submission: (Learning objectives 1, 2, & 3) Electronic file named correctly. Assignment submitted according to policy. Correct in-text citations; and appropriate and full Harvard referencing of sources; all references cited in the text are included in correctly formatted list of references. Cohesively and logically written and structured. Formatted according to guidelines provided--eg. spacing, title page etc. Progress Report (Learning objectives 1, 2, & 3) Progress report submitted on time. Sufficient detail provided to assess degree of progress. Level of engagement with the research skills activity in CLOUDDEAKIN is explained. 5 marks…

    • 3286 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Security remains the number one obstacle to adoption of cloud computing for businesses and federal agencies. Public cloud solutions are seen as the most vulnerable options from a security perspective, leaving many federal customers to seek private alternatives to overcome security challenges. Regardless of the deployment model selected—private, public, community, or hybrid—conquering security concerns is required for cloud computing to achieve its full potential as the next generation of IT [information technology] architecture. Recent trends in cloud computing demonstrate the architecture has matured and offers distinct advantages for cyber security defense. Lessons learned continue to emerge with three…

    • 1620 Words
    • 7 Pages
    Better Essays